IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats White Papers (View All Report Types)
 
The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
WHITE PAPER: Learn what IT pros are saying about Microsoft Azure and how it handles identity and access management, network security, data protection, and more. Discover how to gain insight on how your existing environment maps to potential public cloud offerings.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Security Strategies for the Financial Sector
sponsored by Unisys
WHITE PAPER: Financial institutions must tighten security to stop threat actors, or they could create a chain reaction and cripple world trade. Access this resource to learn about tools with a history of stopping cybercrime in the banking industry.
Posted: 23 Aug 2016 | Published: 29 Jul 2016

Unisys

ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

Technology Platforms for Business Integration
sponsored by Infor
WHITE PAPER: Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Mobile Malware Hits Active Sync-Only Devices
sponsored by MobileIron
WHITE PAPER: Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Optimize High-Performing DNS Infrastructures for Greater Security
sponsored by EfficientIP
WHITE PAPER: In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Secure your Mobile Enterprise
sponsored by Unisys
WHITE PAPER: How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Unisys

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement